Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 7475F200CAE for ; Wed, 21 Jun 2017 16:18:05 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 72F27160BE2; Wed, 21 Jun 2017 14:18:05 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id B9FC2160BD0 for ; Wed, 21 Jun 2017 16:18:04 +0200 (CEST) Received: (qmail 71434 invoked by uid 500); 21 Jun 2017 14:18:03 -0000 Mailing-List: contact common-dev-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Delivered-To: mailing list common-dev@hadoop.apache.org Received: (qmail 71423 invoked by uid 99); 21 Jun 2017 14:18:03 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 21 Jun 2017 14:18:03 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id 2BCA51A0279 for ; Wed, 21 Jun 2017 14:18:03 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -100.002 X-Spam-Level: X-Spam-Status: No, score=-100.002 tagged_above=-999 required=6.31 tests=[RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=disabled Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id VcFty1WZZ5Ke for ; Wed, 21 Jun 2017 14:18:02 +0000 (UTC) Received: from mailrelay1-us-west.apache.org (mailrelay1-us-west.apache.org [209.188.14.139]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTP id 0F5E35FC99 for ; Wed, 21 Jun 2017 14:18:02 +0000 (UTC) Received: from jira-lw-us.apache.org (unknown [207.244.88.139]) by mailrelay1-us-west.apache.org (ASF Mail Server at mailrelay1-us-west.apache.org) with ESMTP id F1747E0D76 for ; Wed, 21 Jun 2017 14:18:00 +0000 (UTC) Received: from jira-lw-us.apache.org (localhost [127.0.0.1]) by jira-lw-us.apache.org (ASF Mail Server at jira-lw-us.apache.org) with ESMTP id 3E9D3240A5 for ; Wed, 21 Jun 2017 14:18:00 +0000 (UTC) Date: Wed, 21 Jun 2017 14:18:00 +0000 (UTC) From: "Rushabh S Shah (JIRA)" To: common-dev@hadoop.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Created] (HADOOP-14563) LoadBalancingKMSClientProvider#warmUpEncryptedKeys swallows IOException MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 archived-at: Wed, 21 Jun 2017 14:18:05 -0000 Rushabh S Shah created HADOOP-14563: --------------------------------------- Summary: LoadBalancingKMSClientProvider#warmUpEncryptedKeys swallows IOException Key: HADOOP-14563 URL: https://issues.apache.org/jira/browse/HADOOP-14563 Project: Hadoop Common Issue Type: Bug Affects Versions: 2.8.1 Reporter: Rushabh S Shah Assignee: Rushabh S Shah TestAclsEndToEnd is failing consistently in HADOOP-14521. The reason behind it is LoadBalancingKMSClientProvider#warmUpEncryptedKeys swallows IOException while KMSClientProvider#warmUpEncryptedKeys throws all the way back to createEncryptionZone and creation of EZ fails. Following are the relevant piece of code snippets. {code:title=KMSClientProvider.java|borderStyle=solid} @Override public void warmUpEncryptedKeys(String... keyNames) throws IOException { try { encKeyVersionQueue.initializeQueuesForKeys(keyNames); } catch (ExecutionException e) { throw new IOException(e); } } {code} {code:title=LoadBalancingKMSClientProvider.java|borderStyle=solid} // This request is sent to all providers in the load-balancing group @Override public void warmUpEncryptedKeys(String... keyNames) throws IOException { for (KMSClientProvider provider : providers) { try { provider.warmUpEncryptedKeys(keyNames); } catch (IOException ioe) { LOG.error( "Error warming up keys for provider with url" + "[" + provider.getKMSUrl() + "]", ioe); } } } {code} In HADOOP-14521, I intend to always instantiate LoadBalancingKMSClientProvider even if there is only one provider so that the retries can applied at only one place. We need to decide whether we want to fail in both the case or continue. -- This message was sent by Atlassian JIRA (v6.4.14#64029) --------------------------------------------------------------------- To unsubscribe, e-mail: common-dev-unsubscribe@hadoop.apache.org For additional commands, e-mail: common-dev-help@hadoop.apache.org